|Publication number||US7634458 B2|
|Application number||US 11/458,926|
|Publication date||Dec 15, 2009|
|Priority date||Jul 20, 2006|
|Also published as||US20080021903|
|Publication number||11458926, 458926, US 7634458 B2, US 7634458B2, US-B2-7634458, US7634458 B2, US7634458B2|
|Inventors||Nikhil Singhal, Michael I. Torres, Charles K. Martz|
|Original Assignee||Microsoft Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (18), Non-Patent Citations (3), Referenced by (4), Classifications (8), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The Internet has become a popular medium for sharing information. In particular, web services which provide a network of personal content pages are growing in popularity. These web services allow users of different ages, including those not of legal adult age, to generate and maintain a personal content page. The personal content page may be customized by the page owner to include photos, a blog, video and other personal information. The personal information may include profile information, geographical information, age and contact information.
A network of personal content pages may be crawled and indexed by a web crawler. The search engine utilizes search terms received from a user to search personal content page data that has been crawled and indexed. The personal content page data may include meta-data associated with data contained in each content page. The meta-data may indicate hobbies, geographic information, and other data associated with the content page and the page owner. When meta-data and associated content for a content page matches the search terms of a search, a link for the corresponding content page is provided in the search results.
The meta-data associated with a page is retrieved by a web crawler. A web crawler requests a personal content page from a content page web service. In response to the request, the content page web service may provide access to the web page as well as a set of meta-data associated with the requested page. The web crawler provides the received meta-data to a data store with other content page data. This data can then be accessed by a search engine.
Search engines with access to personal content pages can be used by predators to retrieve information about non-adult page owners. This may ultimately threaten the safety of the non-adult if the predator uses the information to contact, harm or otherwise take advantage of the non-adult page owner. It would be valuable to protect the privacy of non-adult page owners.
The present technology, roughly described, processes web page access requests received from bots to protect the privacy of a non-adult associated with the web page. The web page may be a personal content page, which may be implemented as and/or include a profile, a blog, or other web page content which may provide personal information for the non-adult. A recognized bot which sends a content request for a personal content page for a non-adult is not provided with search specific meta-data which would allow a search engine to index the page. The withholding of the meta-data prevents effective indexing by search engines. Additionally, the bot is instructed to not access the personal content page associated with the non-adult.
One embodiment of processing content requests includes determining if the request is received from a bot. A bot is recognized as a sender if sender identification information matches a list of known bots. If a request received from a bot is for a content page associated with a non-adult, no indexing meta-data is provided to the bot. This prevents the bot from adding meta-data to a database which may be searched by a search engine. By not including personal content page data associated with a non-adult in database, predators looking to contact, meet, or otherwise take advantage of non-adults may not find the personal content page through the search engine. In some embodiments, meta-data is not provided to any request for a content page associated with a non-adult. In some embodiments, an instruction to not access the content page is provided to the requesting entity that requests content page data for a content page owned by someone not of legal age.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Web page access requests received from bots are processed to protect the privacy of a non-adult associated with the web page. A bot is a program that requests access to website content, parses accessed websites, and saves website data. The web page may be a personal content page, which may be implemented as and/or include a profile, a blog, or other web page content which may provide personal information for the non-adult. A recognized bot which sends a content request for a personal content page for a non-adult is not provided with meta-data which would allow a search engine to index the page. Additionally, the bot is instructed to not access and/or index the personal content page associated with the non-adult.
By not providing personal content page meta-data to the bot and instructing the bot to not access and/or index the non-adult owner's page, the bot should not acquire information regarding the personal content page. Keeping non-adult web page information from the bot prevents any information from the non-adult's personal content page from being saved to a database which is accessible to a search engine. Thus, anyone looking for personal content regarding non-adults would not be able to access a personal content page of the non-adult through the search engine associated with the bot.
A bot is a program that requests access to website content, parses accessed websites, and indexes and/or saves website data. Bots are also known as web crawlers, spiders, and worms. In operation, a bot receives a link, accesses the URL associated with the link and retrieves the HTML data at the URL link. In some embodiments, non-HTML data may also be indexed, such as video, audio, images, etc. For purposes of discussion only, HTML data will be discussed from this point forward. The bot may also receive meta-data associated with the URL link. The HTML data is parsed and stored in a database. The stored data is indexed using data retrieved from the page parsing and/or the received meta-data. The stored data may then be retrieved through a search engine in response to a query. After saving the data, the bot retrieves links from the parsed HTML data and repeats the process.
Instructions to a bot to not access a particular web page should prevent the bot from accessing the page. Policies exist for preventing bots from accessing a website not intended to be accessed by a search engine. Though no standards exist for these policies, several policies involving rules of politeness exist for web-based bots. Examples of these policies include the Robot Exclusion Standard and the Robot Exclusion Protocol. These policies specify procedures for instructing bots when it is acceptable to scan web page content and what content should not be scanned or accessed. In one embodiment, the present technology may utilize statements, methods and other techniques prescribed by these policies in instructing a bot to not access a particular personal content page. This is discussed in more detail below.
Content page server 110 may include search manager 112, library module 114, and one or more content pages 116. Search manager 112 may be comprised of code for handling personal content page requests. The code may be stored entirely on content page server 110 or be distributed over more than one server. In some embodiments, content page server 110 may be implemented as a web service front end server. For example, content page server 110 may be implemented as a front end server for a web service which provides personal content pages.
Library module 114 may include a list of known bots. In some embodiments, an administrator or developer may also add bot information to the library. Library module 114 may be queried to determine if a particular bot is contained in a list of known bots. Library module 114 is discussed in more detail below.
In one embodiment, library 114 may be implemented using “ASP.net” of Microsoft Corporation of Redmond, Wash. ASP.net is a service for providing dynamic content within a web page. As part of providing dynamic web page content, the service may include one or more libraries. One of the one or more libraries may include information regarding known bot types. In some embodiments, the library may be updated periodically by an administrator of the ASP.net service.
In some embodiments, ASP.NET is a type of active server page. An active server page (ASP) is an HTML page that includes one or more scripts that are processed on a web server before the page is sent to the user. An ASP is somewhat similar to a server-side include or a common gateway interface (CGI) application in that all involve programs that run on the server, usually tailoring a page for the user. Typically, the script in the web page at the server uses input received as the result of the user's request for the page to access data from a database and then builds or customizes the page on the fly before sending it to the requestor. ASP.NET is a type of Active Server Page that allows a web site builder to dynamically build web pages on the fly by inserting queries to a relational database in the Web page. ASP.NET supports code written in compiled languages such as Visual Basic, C++, C#, and Perl, and features server controls that can separate the code from the content.
In some embodiments, the system herein does not need to determine whether the request is received from a bot. The system may receive a request and determine if the request is received for a content page having an owner that is not of legal age. If the content page owner is not of legal age, the response to the bot may indicate that the bot is not to index the page, not to follow links to the page, not to otherwise access content data associated with the page, and/or provide other instructions.
Personal content pages may be implemented as and/or include a blog, a user profile or other personal content for the user. A personal content page is associated with or “owned” by a user if the page is associated with a web service account created and maintained by the user. A personal content page may be stored on content page server 110 as personal content page 116 or on content store 120 as personal content page 125, or both. In some embodiments, data for a personal content page may be distributed over a network of two or more servers. Personal content page are discussed in more detail in U.S. patent application Ser. No. 10/978,558, entitled “Dynamic Content Change Notification,” filed on Nov. 1, 2004, having inventors Mike Torez, et al., which is incorporated herein by reference.
Content store 120 may store content for one or more personal content pages. In some embodiments, content page 125 may be stored in whole or in part in content store 120. In some embodiments, content store 120 may store content for user content pages as well as content page preferences. These preferences may include a setting indicating whether a user's personal content page is public or private as well as other preferences. Content store 120 is in communication with content page server 110 and able to process requests received from content page server 110.
Profile store 130 may store profile information for users accessing a content page server network. In particular, profile store 130 may include profile information for users having a personal content page. The profile information contained in profile store 130 may include a user's name, address, e-mail, birth date, and other data. Profile store 130 is in communication with content page server 110 and may process requests received from content page server 110. In some embodiments, content store 120 and profile store 130 may each be implemented as one or more servers.
Processing system 160 includes bot 155, indexer 144, store 150, search engine 152, and query server 154, and is in communication with client web browser 156 on processing device 158. In some embodiments, a user agent may be implemented on processing device 158 in addition to or instead of client web browser 156. In this case, the user agent may be in communication with processing system 160. A user agent may be implemented as a mobile phone, screen reader, personal data assistant (PDA), or other device. Bot 155 (also called a spider or crawler) visits web pages of various web sites to a list of URLs it maintains according to a priority defined by the spider's creator. For each page it encounters, the crawler reads the page, and follows links to other pages within the site. Bot 152 may return to the site on a regular basis to look for changes. The bot 152 takes a list of seed URLs as its input, and for each URL, determines the IP address of its host name, downloads the corresponding document, and extracts any links contained in it. For each of the extracted links, the bot adds it to the list of URLs to download. If desired, the bot may process the downloaded document in other ways, such as adding it to a page cache 144. In some embodiments, some bots and/or web crawlers allow web site owners to “ping” them with a URL when the content of those URL's change or new content is created).
In addition to retrieving web page information by accessing and reading the page, bot 155 may receive meta-data from a server which provides the page content. In this case, the server may provide meta-data which may be used to index the page. Bot 155 may provide the meta-data to indexer 144, which then stores the meta-data in store 150. In response to receiving a search query (e.g., from a user agent or client web browser 156) having terms that match the stored meta-data, search engine 152 and query server 154 may retrieve information for the content page associated with the meta-data provided to bot 155.
Indexer 144 creates an index 146. The index 146, sometimes called the catalog, is a repository containing a key index of terms in every web page that the spider finds and the corresponding URL. The index is stored in data store 150.
Search engine 152 sifts through the pages recorded in the index to find matches to a search and ranks them in order of relevance according to the engine's ranking algorithm. The query can be quite simple, a single word at minimum, or more complex, with words or phrases joined by Boolean operators to refine and extend the terms of the search.
Generally, search engine 152 operates in response to a request from a user via a user agent 156, such as a web browser, on a processing device 158. A query server 154 (web server) provides a search interface, including a keyword entry form, to the user. When a user on a client based user agent 156, such as a web browser, seeks to provide a search query to the information stored in the data store 150, the user will enter their search in the interface provided in the user agent 156 by the query server 154 which will be provided to the search engine 152. The user may enter key words connected by logical operators such as “and,” and “or” which will be used by the search 152 to query the index 146 and retrieve the information according to a ranking system utilized by the search engine 152. The results will be returned by the search engine 152 to the query server 154, which will then present the results and one of any number of multiple formats to user agent 156.
As discussed above, a bot may be a program which requests personal content page data, parses retrieved page data and places index information associated with the data into a search engine index. Examples of bot 155 may include “MSNbot”, provided by Microsoft Corporation, of Redmond, Wash., “Googlebot”, of Google, Inc., of Mountain View, Calif., and “Slurp”, of Yahoo! Inc., of Sunnyvale, Calif. Bot 155 is discussed in more detail below.
The technology is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the technology include, but are not limited to, personal computers, server computers, hand-held or laptop devices, cell phones, smart phones, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The technology may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The technology may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
With reference to
Computer 210 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 210 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 210. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
The system memory 230 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 231 and random access memory (RAM) 232. A basic input/output system 233 (BIOS), containing the basic routines that help to transfer information between elements within computer 210, such as during start-up, is typically stored in ROM 231. RAM 232 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 220. By way of example, and not limitation,
The computer 210 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
The computer 210 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 280. The remote computer 280 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 210, although only a memory storage device 281 has been illustrated in
When used in a LAN networking environment, the computer 210 is connected to the LAN 271 through a network interface or adapter 270. When used in a WAN networking environment, the computer 210 typically includes a modem 272 or other means for establishing communications over the WAN 273, such as the Internet. The modem 272, which may be internal or external, may be connected to the system bus 221 via the user input interface 260, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 210, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
Next, a determination is made by search manager 112 as to whether the received request was sent by a bot at step 320. To determine if the request was sent by a bot, sender information from the request is compared to a list of known bots. First, the request is parsed to identify sender identification information. Sender identification information is then compared to a list of bots to determine if the sender is recognized as a bot. Determining whether a request is sent from a bot at step 320 is discussed in more detail below with respect to
Thus, the standard meta-data fields are not provided if the request is not sent by a recognized bot. In some embodiments, the request may be processed further to provide a response which does not include meta-data associated with the personal content page. For instance, the request is processed further to determine if it was received from a user (e.g., from a client application). If the request is received from a user, a link to the request may be sent to the user's application.
In some embodiments, no determination is made as to whether the request is received from a bot. The response to the request may be determined based on whether the owner of the page is not a legal adult and not what entity the request is received from. Accordingly, after receiving a request for a personal content page at step 310, the process of
A determination is made by search manager 112 as to whether a personal content page owner allows public viewing of his or her page at step 340. In some embodiments, an owner may select one of the several visibility settings associated with a personal content page. The visibility settings may include a public setting which allows anyone to view the page, a private setting which allows no one to view the content page, a contacts-only setting which only allows people included in the content page owner's contact list to view the page, and other variations of limited viewing. In some embodiments, a visibility setting may be retrieved from a remote server where content page settings are stored. Determining whether a personal content page owner allows public viewing of their page is discussed in more detail below with respect to
A determination is made as to whether a personal content page owner is a legal adult at step 350. If an owner is not a legal adult, the personal page content will not be sent to the requesting bot. In some embodiments, the age of a personal content page owner is determined from the page owner's birth date and the current date and the legal adult age. The legal adult age can be configured for each business market. A business market may be a country, geographical area, or some other area which specifies a legal age of an adult. Once the owner's age is determined, the age may be compared to the legal adult age associated with the market in which the page owner resides. Determining whether a personal content page owner is a legal adult is discussed in more detail below with respect to
If a personal content page owner is determined to be a legal adult, index meta-data is provided to the requesting bot at step 360. The index meta-data may enable a search engine to retrieve information for the content page in response to receiving search terms that match at least a portion of the meta-data. In some embodiments, in addition to the indexed metadata, other page content may be accessed by the requesting bot as well. An example of index metadata provided to a bot at step 360 is provided in
If a personal content page owner is determined not to be an adult at step 350, a response is transmitted to the bot with no index meta-data and instructions not to access and/or index the personal content page at step 370. In this case, the response will not include any page content or metadata enabling a search engine to index the content page. Rather, the response may include a “no-index” entry metadata and an instruction to the bot not to access and/or index the page. In some embodiments, page content will still be emitted, but the requesting bot will be instructed not to index and or access the content. In most cases, a bot will adhere to the instruction to not access a content page according to politeness policies followed by most bots and web crawlers. An example of the metadata provided to a bot at step 370 when the personal content page owner is not a legal adult is provided in
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322; .NET CLR 1.0.3705; InfoPath.1; .NET CLR 2.0.50727).
To retrieve the user-agent field, search manager 112 parses the received request. As a result of parsing the request, search manager 112 retrieves the data in with the user-agent field.
Next, search manager 112 sends a query to library 114 to determine if the retrieved user-agent field data identifies a bot at step 420. The query to library 114 includes the retrieved data from the request user-agent field. The purpose of the query is to determine if the data retrieved from the request matches any bot listed in a list of bots.
Library 114 receives the query, accesses a list of bots and compares the user agent field data to the bot list entries at step 430. Examples of some bot entries which may be contained in the user agent field may include those listed at http://www.robotstxt.org/wc/active/html/index.html. For example, some bot entries may be “MSNBOT/0.1”, associated with MSN Search Engine by Microsoft Corporation, and “Googlebot/2.X” associated with Google, Incorporated. After comparing the user agent field to the library bot entries, library 114 generates a response with results of the comparison and sends the response to search manager 112. The response may include a parameter indicating whether the comparison indicated a matching library bot or not. Search manager 112 receives the response sent by library 114 which includes the comparison results. Upon receiving the response, search manager 112 parses the response to determine if the data within the user agent field indicates that the request received at step 310 was received from a recognized bot.
Search manager 112 receives the response sent by content store 120 at step 540. Search manager 112 makes the determination at step 340 based on the content of the response received from content store 120. If the visibility setting data associated with the content page indicates that the page may be viewed by the public, search manager 112 determines that the personal content page owner allows public viewing for the page. Otherwise a determination is made that the content page owner does not allow for public viewing of the page.
Next, profile store 130 receives the request at step 615. Profile store 130 then accesses the birth date for the identified user (the page owner) at step 620. Profile store 130 accesses the birth date for the identified page owner in response to receiving the request. Profile store 130 generates a response to the personal content page owner containing the user identifier and the owner's birth date and sends the response to Search Manager 112 at step 628.
Search manager 112 receives the response with the personal content page owner identifier and birth date at step 630. Search manager 112 then compares the content page owner's birth date with the current date at step 640. Comparing the birth date and current date enables the search manager 112 to determine the current age of the content page owner.
Next, search manager 112 compares the personal content page owner's age to the legal adult age for the applicable market at step 650. As such, search manager 112 determines if the content page owner is a minor or an adult according to the legal adult age for the applicable market. In some embodiments, different markets or geographical areas may have a different legal adult age. For example, the legal adult age in the United States may be eighteen and the legal adult age in Korea may be twenty. Thus, if the content page owner's age is greater than or equal to the legal adult age for the applicable market in which the content page owner resides, the owner is not a minor and is considered a legal adult. Otherwise, the content page owner is determined to be a minor and not a legal adult.
META NAME = “robots” CONTENT = “noindex, nofollow.
In one embodiment, this metadata is directed towards recognized bots (identified as “robots”). The one or more tags included in the response enables users may not always adjust, control or manage the robots.txt file at their sites to keep their content out of search services. The “noindex” content of the meta-data indicates that the bot should not index the contents of this page and add it to their search services. Further, the “nofollow” content of the metadata indicates that the should not follow (or explore) links from this page. Typically, most bots or crawlers will respect the provided “nofollow” metadata in accordance with recognized bot politeness policies. By following the “nofollow” meta-data, bots will not attempt to access data or other content from the personal content page previously requested by the bot.
<META NAME=“search.st” CONTENT=“Charlie's+Space”>
<META NAME=“search.sa” CONTENT=“cmartztest1”>
<META NAME=“search.market” CONTENT=“en-US”>
<META NAME=“search.pt” CONTENT=“Blog”>.
The metadata indicates a site title of “Charlie's Space”, site alias of “cmartztest1”, the market associated with the content page “en-US” and the type of page “Blog” associated with the requested link. The metadata provided in
The foregoing detailed description of the technology herein has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the technology to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the technology and its practical application to thereby enable others skilled in the art to best utilize the technology in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the technology be defined by the claims appended hereto.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6253198 *||May 11, 1999||Jun 26, 2001||Search Mechanics, Inc.||Process for maintaining ongoing registration for pages on a given search engine|
|US6631369||Jun 30, 1999||Oct 7, 2003||Microsoft Corporation||Method and system for incremental web crawling|
|US6675205 *||Jul 20, 2001||Jan 6, 2004||Arcessa, Inc.||Peer-to-peer automated anonymous asynchronous file sharing|
|US6983379||Jun 30, 2000||Jan 3, 2006||Hitwise Pty. Ltd.||Method and system for monitoring online behavior at a remote site and creating online behavior profiles|
|US7249315 *||Sep 13, 2001||Jul 24, 2007||John Brent Moetteli||System and method of creating and following URL tours|
|US20020038431||Sep 14, 2001||Mar 28, 2002||Chesko John E.A.||Internet privacy system|
|US20020143961||Mar 14, 2001||Oct 3, 2002||Siegel Eric Victor||Access control protocol for user profile management|
|US20020194358||Apr 25, 2002||Dec 19, 2002||International Business Machines Corporation||Method and system for controlling transmission of information|
|US20030069741||Oct 5, 2001||Apr 10, 2003||Hoyer Daniel R.||Method for verifying and limiting personal information use from one location|
|US20040034799 *||Jul 31, 2003||Feb 19, 2004||International Business Machines Corporation||Network system allowing the sharing of user profile information among network users|
|US20040044962||May 8, 2001||Mar 4, 2004||Green Jacob William||Relevant search rankings using high refresh-rate distributed crawling|
|US20040093414||Aug 25, 2003||May 13, 2004||Orton Kevin R.||System for prevention of undesirable Internet content|
|US20040139025||Nov 10, 2003||Jul 15, 2004||Coleman Thomas E.||Privacy protection system and method|
|US20050071766||Sep 25, 2003||Mar 31, 2005||Brill Eric D.||Systems and methods for client-based web crawling|
|US20070055642 *||May 31, 2004||Mar 8, 2007||Young Kwan Kim||Method of managing websites registered in search engine and a system thereof|
|US20080005125 *||Nov 3, 2006||Jan 3, 2008||Dewey Gaedeke||System for displaying user generated content in a web browser|
|US20080208831 *||Feb 26, 2007||Aug 28, 2008||Microsoft Corporation||Controlling search indexing|
|EP1327942A2||Nov 29, 2002||Jul 16, 2003||Gestweb S.p.A.||A method for preventing a minor from sending personal data on a data communication network|
|1||CXO Media Inc., CIO News Alerts, "Judge: Google Must Hand Over Index Data", http://www.cio.com/blog-view.html?CID=19288, Mar. 20, 2006.|
|2||MSN Kids, Information for Kids/ Information for Parents, "More information about MSN's kids Web sites for parents and other interested adults:" http://kids.msn.com/privacy/default.aspx.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8086621 *||Dec 27, 2011||International Business Machines Corporation||Search engine service utilizing the addition of noise|
|US8671087 *||Dec 5, 2011||Mar 11, 2014||Mcafee, Inc.||System, method and computer program product for scanning and indexing data for different purposes|
|US20100169294 *||Dec 30, 2008||Jul 1, 2010||International Business Machines Corporation||Search engine service utilizing the addition of noise|
|US20120079117 *||Dec 5, 2011||Mar 29, 2012||Mcafee, Inc., A Delaware Corporation||System, method and computer program product for scanning and indexing data for different purposes|
|U.S. Classification||1/1, 707/999.002, 707/999.01, 707/999.2|
|Cooperative Classification||G06F17/30867, Y10S707/99932|
|Jul 24, 2006||AS||Assignment|
Owner name: MICROSOFT CORPORATION, WASHINGTON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SINGHAL, NIKHIL;TORRES, MICHAEL I.;MARTZ, CHARLES K.;REEL/FRAME:017984/0838
Effective date: 20060719
|Nov 9, 2010||CC||Certificate of correction|
|Mar 18, 2013||FPAY||Fee payment|
Year of fee payment: 4
|Dec 9, 2014||AS||Assignment|
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034542/0001
Effective date: 20141014